> > man dd ?
>
> "That can be done manually" does not get you the check mark in
> the list of features. Management wants idiot-resistant security.
It has nothing to do with idiot-resistance. Why should this multi-write
operation be done in kernel ? mkswap is a usermode program. mkfs is a
usermode program. If you want to have a wipeswap script that copies a
chunk of your /dev/zero to the swap, it should also be in usermode. Just
run it in wherever rc file you use to swapoff.
However, it'll just give you false sense of security. First of all, its
hardware dependent. Second, it won't get wipe in case of a crash (which
is likely to happen when They come to take your disk).
Until linux gets a real encrypted swap (the kind OpenBSD implements), you
can settle for encrypting your whole swap with one random key that gets
lost on reboot. Encrypted loop dev with a key from /dev/random easily
gives you that.
Download the latest loop-AES from http://loop-aes.sourceforge.net/ and
follow the "Encrypting swap on 2.4 kernels" section in README.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/